Secure and Safe Architectures, Networks and Protocols

We are focusing on reliability and enhancing security of the information technology. The research is mainly focused on secure and reliable computing architectures, networks and protocols for both regular and embedded systems.

Intentional or unintentional abuse of information technologies (IT) is considered one of the most serious threats to modern society. Within the context of the abuse of knowledge and information technologies, the requirements for system security are as important as a system’s function, price or maintainability. Due to the vast complexity of computer systems as well as increasing the importance of the tasks that computers are used for, the issue of correct and reliable operation of these systems, even in situations where they are not exposed to any attacks, is of utmost importance - and is in no way trivial.

In addition, the importance of IT as a means to search for safety risks within society, with regard to attacks, criminal activity, or prevention of damage caused by nature disasters, is also increasing. Within the research dealing mainly with embedded systems, we are focusing on secure and reliable architectures, networks and protocols.

For example, in the field of software, we are studying automatic formal code verification, developing algorithms used for advanced biometric authentication and coming up with modern design systems for HW/SW co-design. With regards to hardware, we are examining the methods used for assuring resistance against failures, designing autonomous reconfiguration hardware and finding ways of accelerating key security algorithms.